CVE-2021-40113

10.0 CRITICAL

📋 TL;DR

Multiple vulnerabilities in Cisco Catalyst PON Series Switches ONT web management interface allow unauthenticated remote attackers to log in with default credentials, perform command injection, and modify configurations. This affects organizations using these switches with default or weak configurations. The CVSS 10.0 score indicates critical severity with maximum impact potential.

💻 Affected Systems

Products:
  • Cisco Catalyst PON Series Switches Optical Network Terminal (ONT)
Versions: All versions prior to patched releases
Operating Systems: Cisco proprietary firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerabilities are present in default configurations, particularly when Telnet is enabled. Web management interface must be accessible for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of network infrastructure, unauthorized configuration changes, data exfiltration, and persistent backdoor access leading to network-wide disruption.

🟠

Likely Case

Unauthorized access to network devices, configuration tampering, service disruption, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact with proper access controls, network segmentation, and updated credentials, though vulnerabilities remain present.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Default credential exploitation requires minimal technical skill. Command injection may require more specific knowledge but is well-documented in advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Cisco advisory for specific fixed versions

Vendor Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catpon-multivulns-CE3DSYGr

Restart Required: Yes

Instructions:

1. Review Cisco advisory for affected models. 2. Download appropriate firmware updates from Cisco Software Center. 3. Backup current configuration. 4. Apply firmware update following Cisco documentation. 5. Verify update success and restore configuration if needed.

🔧 Temporary Workarounds

Disable Telnet Protocol

all

Prevents default credential login via Telnet

no telnet enable

Change Default Credentials

all

Replace factory default credentials with strong unique passwords

username admin password <strong_password>

Restrict Management Interface Access

all

Limit web management interface to trusted networks only

access-list 10 permit <trusted_network>
ip http access-class 10

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PON switches from untrusted networks
  • Enable comprehensive logging and monitoring for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Cisco advisory. Verify if Telnet is enabled and default credentials are in use.

Check Version:

show version

Verify Fix Applied:

Confirm firmware version is updated to patched release. Test that default credentials no longer work and command injection attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts from unknown IPs
  • Successful logins with default credentials
  • Configuration changes from unauthorized users
  • Telnet connection attempts

Network Indicators:

  • Unexpected traffic to/from PON management interfaces
  • Telnet sessions to PON devices
  • HTTP/HTTPS requests to management interface from unusual sources

SIEM Query:

source_ip="PON_management_IP" AND (event_type="authentication_failure" OR event_type="configuration_change")

🔗 References

📤 Share & Export